-
1
-
-
4043116941
-
Private authentication
-
Sept
-
M. Abadi and C. Foumet. Private authentication. Theor. Comput. Sci., 322(3):427-476, Sept. 2004.
-
(2004)
Theor. Comput. Sci
, vol.322
, Issue.3
, pp. 427-476
-
-
Abadi, M.1
Foumet, C.2
-
2
-
-
51049109401
-
Enhancing Privacy with Shared Pseudo Random Sequences
-
Cambridge, UK, Apr
-
J. Arkko, P. Nikander, and M. Näslund. Enhancing Privacy with Shared Pseudo Random Sequences. In Proc. of Security Protocols, Cambridge, UK, Apr. 2005.
-
(2005)
Proc. of Security Protocols
-
-
Arkko, J.1
Nikander, P.2
Näslund, M.3
-
3
-
-
85084163516
-
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute
-
May
-
D. Balfanz, G. Durfee, R. E. Grinter, D. Smetter, and P. Stewart. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. In Proc. of USENIX Security, May 2004.
-
(2004)
Proc. of USENIX Security
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.E.3
Smetter, D.4
Stewart, P.5
-
4
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
May
-
D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, and H.-C. Wong. Secret handshakes from pairing-based key agreements. In Proc. of IEEE Security and Privacy, May 2003.
-
(2003)
Proc. of IEEE Security and Privacy
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.-C.6
-
6
-
-
33646870054
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Aug
-
D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Proc. of Crypto '05, Aug. 2005.
-
(2005)
Proc. of Crypto '05
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
7
-
-
8344257266
-
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card
-
Mar
-
R. Chandra, P. Bahl, and P. Bahl. MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card. In Proc. of Infocom, Mar. 2004.
-
(2004)
Proc. of Infocom
-
-
Chandra, R.1
Bahl, P.2
Bahl, P.3
-
8
-
-
35448936042
-
SmokeScreen: Flexible Privacy Controls for Presence-Sharing
-
June
-
L. P. Cox, A. Dalton, and V. Marupadi. SmokeScreen: Flexible Privacy Controls for Presence-Sharing. In Proc. of MobiSys '07, June 2007.
-
(2007)
Proc. of MobiSys '07
-
-
Cox, L.P.1
Dalton, A.2
Marupadi, V.3
-
11
-
-
85018108881
-
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
-
July/August
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In Proc. of USENIX Security, July/August 2006.
-
(2006)
Proc. of USENIX Security
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
13
-
-
85092666359
-
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices
-
May
-
B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno, S. Seshan, and D. Wetherall. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices. In Proc. of HotOS XI, May 2007.
-
(2007)
Proc. of HotOS XI
-
-
Greenstein, B.1
Gummadi, R.2
Pang, J.3
Chen, M.Y.4
Kohno, T.5
Seshan, S.6
Wetherall, D.7
-
14
-
-
67650661159
-
Improving wireless privacy with an identifier-free link layer protocol
-
June
-
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In Proc. of MobiSys '08, June 2008.
-
(2008)
Proc. of MobiSys '08
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
15
-
-
1642314732
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
Sept
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. In Proc. of ACM WMASH, Sept. 2003.
-
(2003)
Proc. of ACM WMASH
-
-
Gruteser, M.1
Grunwald, D.2
-
16
-
-
70349083033
-
-
IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), June 2007.
-
IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), June 2007.
-
-
-
-
17
-
-
70349135978
-
-
ISO/IEC. Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function, 1999. Reference number ISO/IEC 9798-4:1999(E).
-
ISO/IEC. Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function, 1999. Reference number ISO/IEC 9798-4:1999(E).
-
-
-
-
19
-
-
57349178614
-
RFID security and privacy: A research survey
-
Feb
-
A. Juels. RFID security and privacy: a research survey. IEEE JSAC, Feb. 2006.
-
(2006)
IEEE JSAC
-
-
Juels, A.1
-
20
-
-
70349136362
-
-
B. Kalinski. RFC 2898: PKCS #5: Password-Based Cryptography Specification Version 2.0, Sept. 2000.
-
B. Kalinski. RFC 2898: PKCS #5: Password-Based Cryptography Specification Version 2.0, Sept. 2000.
-
-
-
-
22
-
-
70349120442
-
Privacy-preserving 802.11 access-point discovery (full version)
-
MSR-TR-2009-7, Jan. 2009
-
J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi, J. Maki, and M. Roe. Privacy-preserving 802.11 access-point discovery (full version). Microsoft Research Technical Report, MSR-TR-2009-7, Jan. 2009.
-
Microsoft Research Technical Report
-
-
Lindqvist, J.1
Aura, T.2
Danezis, G.3
Koponen, T.4
Myllyniemi, A.5
Maki, J.6
Roe, M.7
-
26
-
-
70349150614
-
-
OpenWrt. http://openwrt.org/.
-
OpenWrt
-
-
-
27
-
-
70349139330
-
-
ORBIT
-
ORBIT. Wireless testbed. http://www.orbit-lab.org/.
-
Wireless testbed
-
-
-
28
-
-
33847229560
-
-
Version 2, Oct, Internet-Draft. Expired
-
A. Palekar, D. Simon, J. Salowey, H. Zhou, G. Zorn, and S. Josefsson. Protected EAP Protocol (PEAP) Version 2, Oct. 2004. Internet-Draft. Expired.
-
(2004)
Protected EAP Protocol (PEAP)
-
-
Palekar, A.1
Simon, D.2
Salowey, J.3
Zhou, H.4
Zorn, G.5
Josefsson, S.6
-
29
-
-
37749006403
-
802.11 user fingerprinting
-
Sept
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In MobiCom'07, Sept. 2007.
-
(2007)
MobiCom'07
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
30
-
-
84866369989
-
Tryst: The Case for Confidential Service Discovery
-
Nov
-
J. Pang, B. Greenstein, D. McCoy, S. Seshan, and D. Wetherall. Tryst: The Case for Confidential Service Discovery. In Proc. of HotNets-VI, Nov. 2007.
-
(2007)
Proc. of HotNets-VI
-
-
Pang, J.1
Greenstein, B.2
McCoy, D.3
Seshan, S.4
Wetherall, D.5
-
32
-
-
78650117270
-
Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing
-
Aug
-
T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing. In Proc. of USENIX Security, Aug. 2007.
-
(2007)
Proc. of USENIX Security
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
35
-
-
70349136759
-
-
Wifi Alliance. Wi-fi protected setup specification, version 1.0h, Dec. 2006.
-
Wifi Alliance. Wi-fi protected setup specification, version 1.0h, Dec. 2006.
-
-
-
|